OpenID homesite authorization spoofed
Eddy Nigg (StartCom Ltd.)
eddy_nigg at startcom.org
Mon Oct 23 14:17:33 UTC 2006
Chris Drake wrote:
> Hi Eddy,
Hi Chris,
> In other words: attacker can just as easily self-sign a bogus SSL
> certificate as they can self-sign their bogus DNSSEC server replies.
>
However if we rely on CA's, than we can verify the singer of the
certificate of the IDP and RP sites....This shouldn't be too hard to
implement, I think....and would give a reasonable protection at least...
--
Regards
Signer: Eddy Nigg, StartCom Ltd.
Phone: +1.213.341.0390
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20061023/4295dc56/attachment-0002.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: eddy_nigg.vcf
Type: text/x-vcard
Size: 636 bytes
Desc: not available
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20061023/4295dc56/attachment-0002.vcf>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 7282 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20061023/4295dc56/attachment-0002.bin>
More information about the general
mailing list